Supercharge Your Innovation With Domain-Expert AI Agents!

Network flow control method and system and safety protection device

A network traffic and control system technology, applied in the fields of systems, security protection devices, and network traffic control methods, can solve problems such as poor network traffic protection effect, and achieve the goal of solving poor protection effect, overcoming network attacks, and improving network protection effect. Effect

Active Publication Date: 2019-10-29
ALIBABA GRP HLDG LTD
View PDF10 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a network flow control method, system and safety protection device, to at least solve the technical problem that the existing firewall mode has poor protection effect on network flow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network flow control method and system and safety protection device
  • Network flow control method and system and safety protection device
  • Network flow control method and system and safety protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to an embodiment of the present application, an embodiment of a network traffic control system is provided, which can be applied to network security protection between an internal network and an external network, between a private network and a public network, and between a computer and a network connected to it.

[0037]Due to the openness of the Internet, while the Internet brings convenience to people's life and work, people pay more and more attention to information security. As an isolation technology, a firewall can isolate any network between two networks (including but not limited to two internal networks, internal network and external network), or terminal devices (including but not limited to mobile phones, laptops, computers, tablets, etc.) A device that can be connected to the Internet) and the network communication traffic between the network are inspected, filtered and restricted to prevent unauthorized access, thereby ensuring the security of the...

Embodiment 2

[0067] According to the embodiment of the present application, an embodiment of a network traffic control method is also provided. This embodiment can be applied to the network traffic control system in Embodiment 1, including but not limited to the scenario in Embodiment 1. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0068] Because the existing technology uses multiple firewalls connected in parallel to form a firewall cluster to realize the function of a traditional single firewall, although the problem that network services or applications are affected by the firewall bandwidth due to the access of a single firewall can be overcome, due to the scattered flow of network traffic With multip...

Embodiment 3

[0122] According to an embodiment of the present application, an embodiment of a device for implementing the above network traffic control method is also provided, Figure 13 is a schematic diagram of a network traffic control device according to an embodiment of the present application, such as Figure 13 As shown, the device includes: a receiving unit 131 , an analyzing unit 133 and a first determining unit 135 .

[0123] Wherein, the receiving unit 131 is configured to receive flow feature information reported by the firewall;

[0124] An analyzing unit 133, configured to analyze flow characteristic information and / or network behavior information determined by the flow characteristic information, and obtain an analysis result;

[0125] The first determining unit 135 is configured to determine a control instruction to be delivered to the firewall according to the analysis result, wherein the control instruction is used to control network traffic flowing through the firewall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network flow control method, a network flow control system and a safety protection device. The method comprises the following steps: receiving flow characteristic informationreported by a firewall; analyzing the flow characteristic information and / or the network behavior information determined by the flow characteristic information to obtain an analysis result; and determining a control instruction issued to the firewall according to the analysis result, the control instruction being used for controlling network traffic flowing through the firewall. The technical problem that an existing firewall mode is poor in network flow protection effect is solved.

Description

technical field [0001] The present application relates to the field of computer networks, in particular, to a network flow control method, system and safety protection device. Background technique [0002] A firewall is a technical measure to protect computer network security. It isolates the internal network from the external network by establishing a corresponding network communication monitoring system on the network boundary to block network intrusion from the outside. figure 1 It is a schematic diagram of an optional firewall protection architecture according to the prior art, such as figure 1 As shown, when the traffic of the operator on the side of the Internet Service Provider (Internet Service Provider, ISP) enters the router, the traffic is distributed inside the firewall cluster through the load balancing policy of the router. After the firewall checks and filters the traffic flowing through its own node, it forwards the traffic to the switch and forwards it to t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/801H04L12/803H04L29/06H04L47/2475
CPCH04L47/10H04L47/125H04L63/02H04L63/0209H04L63/0218H04L63/0254H04L63/0263Y02D30/50H04L63/0227
Inventor 屠一凡
Owner ALIBABA GRP HLDG LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More